github.com/zitadel/.../command vulnerabilities

License

>=v0.0.0-20230609131415-dafa8ab4dfe8 <v0.0.0-20230621162228-aa4202145c22;
>=v0.0.0-20240115151045-fc3489609242 <v0.1.0;
>=v1.80.0-v2.20.0.20230609131415-dafa8ab4dfe8 <v1.80.0-v2.20.0.20230621162228-aa4202145c22;
>=v1.80.0-v2.20.0.20250708144743-0ceec606376a <v1.80.0-v2.20.0.20250716071019-312b7b601031;
>=v1.80.0-v2.20.0.20250718121822-25adfd91a2af <v1.80.0-v2.20.0.20251002081443-ee3654fe6f1c;
>=v1.80.0-v2.20.0.20251029090537-72a5c33e6ac3 <v1.80.0-workflow-dispatch.1;
>=v0.0.0 <v0.0.0-20230609131415-dafa8ab4dfe8;
>=v0.0.0-20230621162228-aa4202145c22 <v0.0.0-20240115151045-fc3489609242;
>=v0.1.0 <v1.80.0-v2.20.0.20230609131415-dafa8ab4dfe8;

Direct Vulnerabilities

Known vulnerabilities in the github.com/zitadel/zitadel/internal/command package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Authorization Bypass Through User-Controlled Key

<4.6.3
  • H
Brute Force

<2.71.18>=3.0.0-rc.1 <3.4.3>=4.0.0-rc.1 <4.6.0
  • H
Incorrect Authorization

>=2.53.0 <2.70.14>=2.71.0 <2.71.13>=3.0.0 <3.3.2>=4.0.0-rc.1 <4.0.0-rc.2
  • M
Insufficient Session Expiration

<2.70.10>=2.71.0 <2.71.8>=3.0.0-rc.1 <3.0.0-rc.3
  • H
Operation on a Resource after Expiration or Release

*
  • M
Information Exposure Through Discrepancy

>=2.53.0 <2.53.9>=2.54.0 <2.54.8>=2.55.0 <2.55.5>=2.56.0 <2.56.2>=2.57.0 <2.57.1>=2.58.0 <2.58.1
  • M
Brute Force

<2.50.0-rc.1
  • M
Improper Authorization

>=1.42.0 <1.87.1>=2.0.0 <2.2.0